mthbernardes / QMKhuehuebrLinks
Trying to hack into keyboards
☆86Updated 6 years ago
Alternatives and similar repositories for QMKhuehuebr
Users that are interested in QMKhuehuebr are comparing it to the libraries listed below
Sorting:
- A shellcode testing harness.☆70Updated last year
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated 2 years ago
- Red Team Resources☆60Updated 6 years ago
- a radare2 plugin that decodes packets with Scapy☆33Updated 7 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- LKM rootkit for Linux Kernels 2.6.x/3.x/4.x☆39Updated 6 years ago
- DNS server limitation mapper☆26Updated 6 years ago
- Proof of Concept for CVE-2018-11776☆21Updated 6 years ago
- Example ASM code following SLAE course and exam assignments.☆36Updated 8 years ago
- Very crude and poorly written HTTP(s) and SMTP bin☆93Updated 4 years ago
- ☆102Updated 6 years ago
- The Alternative Fileless File System☆57Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Tool to make in memory man in the middle☆125Updated 6 years ago
- Unblockable Chains - A POC on using blockchain as infrastructure for malware operations☆67Updated 6 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- ☆122Updated 7 years ago
- ☆25Updated 4 months ago
- ☆47Updated 5 years ago
- Discover target social media profiles☆81Updated 2 years ago
- Privilege Escilation training project, with an emphasis on the distinction between vulnerability research & it's exposure and exploitatio…☆35Updated 8 years ago
- Material from our CANAPE workshop☆32Updated 6 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Updated 6 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Leveraging CVE-2018-19788 without root shells☆19Updated 6 years ago
- UAC 0Day all day!☆57Updated 7 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- CANAPE Network Testing Tool☆34Updated 6 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Updated 5 years ago
- Simple DDE object detector☆56Updated 7 years ago